Which Social Media Channel is Right for You?

ThinkstockPhotos-473035192The majority of small and mid-sized businesses use social media to grow. And yet for many of these firms, deciding which of the sites to use, and how best to find clientele on them, remains a challenge.

SocialCentiv, whose software-based service helps companies find new customers on Twitter, today released its evaluation of how five of the social media world’s most popular sites perform as marketing vehicles for small businesses.

In addition to Twitter, SocialCentiv’s guide includes looks at the pluses and minuses of Facebook, Google+, LinkedIn and Pinterest.

SocialCentiv’s conclusion: For many small businesses, Twitter delivers the most bang for the advertising buck.

“Roughly 80 percent of small and mid-sized companies employ social media in their expansion efforts,” said Bernard Perrine, co-founder and CEO of SocialCentiv. “And yet a 2013 study found that nearly 60 percent of small business owners had received no return on their investments in social networking. While that can be understandable, it is also unnecessary.”

A major reason why small businesses often find marketing value elusive on social media is the dizzying array of networking sites to choose from, Perrine said.

Dozens have sprung up, aimed at everyone from nightclub patrons and creative talent to research scientists, human resources professionals and knitters and crocheters.

Optimally, for time-pressed entrepreneurs, it often makes more sense to research which site or sites their customers frequent, and focus their efforts there. Which will you focus on? Here is the skinny on the most popular social networks.

Facebook: Prominent, but pricey

For many small businesses, the answer to where their customers are hanging out in the social media landscape will, at first blush, appear to be Facebook.

Facebook’s more than 1.39 billion active users spend an average of about 20 minutes on the site per visit. About 48 percent of people between the ages of 18 and 34 check Facebook when they wake up, according to Statistic Brain.

“Around seven out of every 10 Internet users in the United States is on Facebook,” Perrine said. “The site is the biggest, most dominant player in social media.”

Another advantage of Facebook is that advertisers can target would-be customers based on a variety of criteria, such as an individual’s location, gender, interests and relationship status.

The flip side, Perrine noted, is that the marketing landscape on Facebook is getting crowded. The site had 1.5 million advertisers in the summer of 2014. And as of late 2013, one million of its advertisers were small and mid-sized businesses.

“At least one observer has wondered whether Facebook is reaching the point of advertising saturation, where marketing efforts become increasingly difficult as an overload of companies try to reach the same customer base,” Perrine said.

Making matters worse, Facebook is effectively killing off “organic,” or unpaid, reach by corporate marketers – ensuring they must pay to share their messages with the site’s members. In response, Forrester Research has urged brands to “stop making Facebook the center of (their) relationship marketing efforts.”

“As has been noted elsewhere, Facebook knows it has the biggest user base in social media, and it’s advertising prices are starting to reflect that,” Perrine said. “As the head of a small business myself, I can understand why other entrepreneurs could have a hard time achieving much of a return on investment from marketing on Facebook.”

Google+: Where are the members?

This social network is a bit of an odd duck. Although it boasts in the neighborhood of 2.2 billion user profiles, one study found that only 9.9 percent of those profiles have any content that has been posted publicly.

It gets stranger still. Another researcher estimated in January 2015 that the service had only four million to six million active posters to date.

“Nobody is using Google+,” Business Insider wrote in reporting what those two researchers had discovered.

Since its inception in 2011, Google+ has had a user base made up of younger, technology-friendly men. That can make it attractive for companies that could find value in that demographic, such as emerging technology firms that seek an audience willing to take a flyer on new software or hardware systems, Perrine said.

“Aside from niche marketers like that, I have difficulty seeing the value for small businesses of spending marketing dollars on Google+,” he added. “There are simply too many mysteries about the network’s user base that need clarifying first.”

LinkedIn: Favorite for B2B marketers

Like Google+, LinkedIn is an odd duck – albeit in a good way.

With 300 million-plus active users, LinkedIn’s niche is the professional audience. This gives it an edge in in users that are college educated (38 percent) and between the ages of 30 and 49 (representing 27 percent of U.S. Internet users in that span).

In fact, Business Insider discovered that LinkedIn is the only major social media outlet that has higher penetration rates among users in the 50- to 64-year-old age group than in the 18- to 29-year-old bracket.

“A 2013 study found that 53 percent of business-to-business advertisers had successfully used LinkedIn to acquire a customer, compared to 22 percent for business to consumer marketers,” Perrine said.

“Advertisers can target LinkedIn audiences on everything from their job titles and employers to geography and age,” Perrine said. “That can be a compelling proposition for purveyors of high-end business services, such as accounting and valuation.”

But observers such as WordStream have noted that LinkedIn can be a costly advertising platform.

“LinkedIn may simply provide a wealthier, higher-end audience than many small businesses need or can afford,” Perrine said. “For advertisers that cater to younger or less affluent demographics, other social platforms may better serve their interests.”

Pinterest and Instagram: Picture-heavy

Pinterest has definite pluses for marketers, although some outsiders are already wondering how much growth will be in store for the site, which should hit 47 million monthly active users this year.

An eMarketer study released in February said that Pinterest’s essential function – serving as an online pin board or visual bookmark – “isn’t necessarily something that large numbers of people may want to do.”

Another point to consider: The vast majority of Pinterest members are female. Although men are growing their share of Pinterest’s user base, they currently make up 16.7 percent, and eMarketer projects they will account for only 20.5 percent by 2019.

“While estimates vary, women drive somewhere between 70 percent to 80 percent of consumer spending. They also serve as 75 percent of the primary shoppers in their households,” Perrine noted. “Marketers who ignore female customers do so at their peril.”

That said, Pinterest is still an emerging platform, and thus may not be a perfect fit for every advertiser.

“The emphasis on Pinterest is the visual,” Perrine said. “To attract users’ attention, marketers need compelling images or videos, which can be a challenge for small businesses in, say, the services space.”

Another issue is Pinterest’s advertising product suite, which eMarketer called “fairly limited.”

“While Pinterest may have value for some small businesses, it remains something of a niche play,” Perrine said.

Some of the knocks on Pinterest as marketing vehicle also extend to Instagram, the image and video-heavy social site that Facebook owns.

In addition, figures floated in the trade press about the cost of Instagram advertising suggest that the network could be beyond the means of many small businesses.

“A year ago, one outlet reported that Instagram ad campaigns can cost nearly $1 million,” Perrine said. “Fairly or not, when those types of numbers surface, entrepreneurs can be left with the impression that Instagram is a playground for big brands alone.”

Why Twitter works

Twitter brings an advantage for advertisers that other social platforms cannot match: The ability to reach consumers at the time they’re ready to buy.

“The seemingly simple innovation of limiting users’ posts to 140 characters means people use Twitter to express what they want in real time,” Perrine said. “Two of the most common phrases that people Tweet are ‘I want’ and ‘I need.’ Those are the words every advertiser wants to hear.”

While the sheer volume of Twitter usage can present a challenge for small marketers, tools like SocialCentiv can make the process of finding willing customers a snap.

“Some 288 million monthly active users send roughly 500 million Tweets daily,” Perrine said. “That can be a lot of posts to comb through. But SocialCentiv’s tools help companies filter out the noise so they can respond in real time with discounts on products and services on which people want to spend money.”

The bottom line, he added, is that SocialCentiv’s software provide small businesses with an affordable, easy and fast avenue for finding new customers in a way that simply wasn’t possible before Twitter got its start in 2006.

“While every social platform presents marketing advantages, nothing beats Twitter,” he said.

SocialCentiv is a user-friendly, do-it-yourself Twitter marketing tool that makes it easy to create a campaign that tracks keywords and reaches relevant consumers with greater precision by targeting local Tweets. 

 

Top 10 Cyber Threats to Small Businesses in 2015

Web threat

Cyber security experts expect cyber security threats to continue in 2015, with innovative attacks. Cyber crime is profitable and the risks for the criminals to be caught or punished are still negligible. 2015 is likely to see more copycat crimes as well as increased sophistication in attacks. Here are the 2015’s Top 10 Cyber Threats from the National Cybersecurity Institute:

Ransomware

Expect increased frequency of ransomware attacks. They will come from new malware as well as be highly clever. The experts forecast attempts at the cloud storage level as well as network level.

What you can do

  • Be sure you have redundancy in backups of your critical data.
  • Make security awareness a company culture to reduce the chances of an employee allowing the malware to access your network

Social Engineering

More cyber criminals will attempt to find ways into networked systems with creative and highly targeted strategies. These people are really, really good at investigating people. CIA level skills of investigating are not uncommon, but often the criminals just search social media and phone employees for easy clues

What you can do

  • Have employees role play social engineering activities so your people understand the type of questions a criminal may ask. Share ways to avoid responding to the criminal’s questions.

Internet of Things

Hackers are expanding their efforts into products that can easily be accessed. They will go after products such as network printers for a lateral attack into a business network. It is all about maneuvering to get to the end goal – confidential data on your network system.

What you can do

  • Ensure your IT specialist looks for second tier entry points. Once top tier entry points are secure, harden the other possible access points to make it more difficult for the hacker.

Rogue Insiders

Even in small businesses, there are disgruntled employees as well as friends and relatives of employees that will exploit an employee.

What you can do

  • Be sure your security precautions do not place employees in the position that they could directly or indirectly access information they do not have a need to access nor remove such data from your company.
  • Evaluate all suspicious activities impartially; don’t assume the employee would never harm your business. Hire a third party to investigate if needed.

Cyber-espionage

Assume there will be more attacks, from more sources. The experts think there will be an increase in attacks from small nation states and terrorist groups. The Sony Pictures attack shows how much media can be generated and how damaging a serious attack can be. There will be copycats in 2015.

What you can do

  • Think about what corporate positions/policies you state on your website or social media. Americans cherish freedom of speech but we must be vigilant to protect that right. Have strong website security to reduce site takeovers or malware distribution opportunities.
  • Be diligent with your security measures and have a strong breach recovery plan in place.

Weak Passwords and Flawed Password Retrieval Processes

If you allow customers or vendors to access confidential information on your system via password, make sure your password reset process is secure and complex. Traditional questions for reset are too easy to hack. Just go to Ancestry.com and find lots of mother’s maiden names.

What you can do

  • Review your password reset procedure to see if the process is complex enough. Two level authentication is better than just answering a basic personal question and providing a user email address.
  • Personal tip: create a fictitious personal profile and family for use on less secure sites that really don’t need true information about you. Who said you can’t select your own relatives or be 21 forever on the internet?

Mobile Device Exposure

With the rapid increase in mobile device usage for business, the amount of business data accessible is staggering. The cyber criminals see this as a rich frontier of opportunity. Even Apple products will be targeted more frequently since the volume of users is now a significant sized market.

What you can do

  • Review your BYOD plan and ensure employees follow it.
  • Control the number of employees that have access to confidential information via mobile devices. Many employees need access during normal working hours in the office, but not all may need the same data access via mobile.

Web-Based Infection and Browser-Based Exploits

Cyber criminals are shifting away from spam to deliver their malware and turning their talents to web-based infection and browser-based exploits. It is very easy to rapidly infect poorly secured websites. There are thousands of websites that are key entry points to company networks and can provide a way to disseminate malware to visitors.

What you can do

  • Ensure that your website software is frequently updated with the latest security patches.
  • Talk with your website developer about where your site is hosted; make sure the hosting server or third party provider has strong security measures in place.

Flaws in Widely-Used Open Source Software

Before Sony Pictures, before Home Depot—Heartbleed was the big problem. There will likely be another exploit on similar hidden open source code. Many systems have embedded open source software; hackers are looking for ways to exploit vulnerabilities that have been dormant for years.

What you can do

  • Stay alert of early warnings of exploits on open source software that is embedded in your system.
  • Patch software immediately after an exploit is announced.

Cyber Theft

Too many merchants and companies that accept credit cards have not fixed their payment system yet. We regularly hear of smaller companies that have a data breach involving stolen credit card information.

What you can do

  • If you accept credit cards, be sure you meet the latest payment system security requirements. If you are not in compliance, you will not only risk losing customers and paying for the recovery, you will likely be sued by the victims as well as the other parties involved.

Cyber crimes are not decreasing. Rather, more crimes will be committed. Recovery will be painful and disruptive. Legal recourse is limited. However, we do know there are many ways a small business can take responsibility and protect itself. You may be hacked, but you can diminish the negative impact with strong cyber security. 2015 will be a year worthy of increased vigilance.

 

6 Steps for Leadership Breakthroughs

Portrait Of Businesspeople In Modern Open Plan Office

By Amy Fox

Breakthroughs are what give leaders an edge, but they don’t just happen and even the most successful leaders can miss opportunities. Here’s how to challenge yourself to achieve breakthroughs with discipline and systematic focus:

1. Reclaim Your Time: Simplify your list of goals and strategies, identify your “make or break” critical factors and enlist your team to relentlessly pursue them.
2. Map Your Process: Leaders need to continually reevaluate their processes, with a focus on the customer’s perspective, to find opportunities to improve.
3. Connect More with Employees: Participate in conversations with employees who are energetic and passionate. Doing this regularly not only makes employees feel valued, but can identify specific calls to action around the organization.
4. Learn from Dissatisfied Clients: You’ll always know where you stand and sometimes rebuild relationships.
5. Force a Fresh Perspective: You don’t need a huge time commitment, but the payoff is huge.
6. Know When to Recharge and Reenergize: Encouragement, optimism and confidence are hallmarks of energized organizations. When they are running low for yourself or your team, it’s time to refuel.
Amy Fox is the president, CEO and founder of Accelerated Business Results.